Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Recent questions tagged security
Home
Tag
security
0
votes
Harassment based on sex can include making stereotypical remarks about someone’s gender.
asked
Nov 5, 2022
in
Security Assessment
by
Robin
security
0
votes
If most people find a comment amusing and inoffensive, then the one person who is offended does not have a right to complain about harassment.
asked
Nov 5, 2022
in
Security Assessment
by
Robin
security
0
votes
If someone is offended by my behavior in the break room, they should take their break somewhere else, or at another time, since I am not “working” while I’m on my break and I have a right to freedom of speech.
asked
Nov 5, 2022
in
Security Assessment
by
Robin
security
0
votes
Quid Pro Quo harassment occurs when a female boss tells dirty jokes to the other women in the office.
asked
Nov 5, 2022
in
Security Assessment
by
Robin
quid-pro-quo
security
0
votes
If my intentions were good – for example, I meant to compliment someone on how great they looked there is no way my conduct could violate the sexual harassment policy.
asked
Nov 5, 2022
in
Security Assessment
by
Robin
security
0
votes
If no one complains, then it’s not sexual harassment
asked
Nov 5, 2022
in
Security Assessment
by
Robin
security
0
votes
Which of the following is not a default Linux namespace?
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
security
containers
linux-namespace
0
votes
Which of the following cloud service providers does not use Docker?
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
security
docker
container
0
votes
Docker uses which Linux Kernel feature to provide resource allocation functionality?
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
docker
security
containers
0
votes
While securing applications deployed with the traditional (non-container) approach, the source code is tested for vulnerabilities by using __________.
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
non-container
containers
security
0
votes
Tern is a tool used to find vulnerabilities in ___________.
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
vulnerabilities
tern
security
containers
0
votes
Which of the following is not an alternative for Docker?
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
docker
security
containers
0
votes
Which of the following is not a valid action performed by Anchore (based on evaluation criteria)?
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
anchor
security
containers
0
votes
Which of the following file is updated in a Linux machine to enable SELinux?
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
security
containers
0
votes
While securing applications deployed with the traditional (non-container) approach, application runtime is tested for vulnerabilities by using _________.
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
security
containers
applications
0
votes
OWASP Zed Attack Proxy (ZAP) is a tool used to find vulnerabilities in ________.
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
owasp
zed-attack-proxy
containers
security
0
votes
While securing applications deployed with container approach, Docker images are scanned by using _________.
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
containers
security
0
votes
We can add or drop capabilities on a Docker container by using which of the following flags?
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
security
containers
flags
0
votes
While securing applications deployed with container approach, security at Kernel level is enforced by using ________.
asked
Oct 5, 2022
in
Security in Containers
by
Robindeniel
container
security
0
votes
Which of the following statements are true in terms of allowing/denying traffic from/to VPC assuming the default rules are not in effect? (choose multiple)
asked
Sep 1, 2022
in
AWS
by
sharadyadav1986
aws
security
vpc
Page:
« prev
1
2
3
4
5
6
next »
...